CVE-2024-8986
Grafana Plugin SDK: Insecure Embedding of Credentials in Binaries
Description
The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`. If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials.
INFO
Published Date :
Sept. 19, 2024, 11:15 a.m.
Last Modified :
Sept. 20, 2024, 12:30 p.m.
Source :
[email protected]
Remotely Exploitable :
No
Impact Score :
Exploitability Score :
Affected Products
The following products are affected by CVE-2024-8986
vulnerability.
Even if cvefeed.io
is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2024-8986
.
URL | Resource |
---|---|
https://grafana.com/security/security-advisories/cve-2024-8986/ |
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2024-8986
vulnerability anywhere in the article.
- Cybersecurity News
Patch Now! Grafana Hit by 9.9 Severity RCE Vulnerability (CVE-2024-9264)
A critical security vulnerability (CVE-2024-9264) has been discovered in Grafana, the popular open-source platform for monitoring and observability. This vulnerability, with a CVSS v3.1 score of 9.9, ... Read more
- Cybersecurity News
Plane Project Management Tool Patches Critical SSRF Flaw – CVE-2024-47830 (CVSS 9.3)
A critical security vulnerability has been discovered and patched in Plane, a popular open-source project management tool. The vulnerability, identified as CVE-2024-47830 and assigned a CVSS score of ... Read more
- TheCyberThrone
TheCyberThrone Security Week In Review – September 28, 2024
Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings. This review is for the week ending Saturday, September 28, 2024.FreeBSD flagged with a ... Read more
- Cybersecurity News
Multiple Vulnerabilities Discovered in PHP, Prompting Urgent Security Updates
The PHP project has recently released a security advisory, addressing several vulnerabilities affecting various versions of PHP. These vulnerabilities range from potential log tampering to arbitrary f ... Read more
- TheCyberThrone
TeamViewer Fixes CVE-2024-7479 and CVE-2024-7481
TeamViewer has addressed two critical vulnerabilities impacting its Remote Client and Remote Host products for Windows.The vulnerabilities tracked as CVE-2024-7479 and CVE-2024-7481 both with a CVSS s ... Read more
- TheCyberThrone
CISA adds Ivanti CVE-2024-7593 to its KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Ivanti Virtual Traffic Manager authentication bypass vulnerability CVE-2024-7593 with a CVSS score 9.8 to its Known Exploited Vul ... Read more
- TheCyberThrone
Grafana fixes Critical Vulnerability CVE-2024-8986
A critical security vulnerability has been discovered in the Grafana Plugin SDK for Go, that could lead to the inadvertent leakage of sensitive information, including repository credentials.The vulne ... Read more
- Cybersecurity News
CVE-2024-8986 (CVSS 9.1): Critical Grafana Plugin SDK Flaw Exposes Sensitive Information
In a concerning development for Grafana users, a critical security vulnerability has been discovered in the Grafana Plugin SDK for Go. Tracked as CVE-2024-8986 and assigned a CVSS score of 9.1, this v ... Read more
The following table lists the changes that have been made to the
CVE-2024-8986
vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Received by [email protected]
Sep. 19, 2024
Action Type Old Value New Value Added Description The grafana plugin SDK bundles build metadata into the binaries it compiles; this metadata includes the repository URI for the plugin being built, as retrieved by running `git remote get-url origin`. If credentials are included in the repository URI (for instance, to allow for fetching of private dependencies), the final binary will contain the full URI, including said credentials. Added Reference Grafana Labs https://grafana.com/security/security-advisories/cve-2024-8986/ [No types assigned] Added CWE Grafana Labs CWE-522 Added CVSS V4.0 Grafana Labs CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:L/U:X
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2024-8986
is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2024-8986
weaknesses.